Applied Technology for Typical Attacks and Security Mechanisms in Wireless Sensor Networks

Article Preview

Abstract:

Wireless Sensor Networks (WSNs) are used in many applications in military and commercial areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. However, due to the highly resource constrained in sensor nodes, traditional security strategies always can do few with attacks on WSNs. In this Paper, we proposes a study of attacks and security mechanisms in WSNs. First, we summarize the attacks to WSNs and the security requirements based on the TCP\IP networking model, then we present the security solutions to each attack. Along the way we highlight the advantages and disadvantages of various WSN solutions and further compare and evaluate these solutions.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

484-490

Citation:

Online since:

June 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] X. Chen et al., Sensor Network Security: A Survey.

Google Scholar

[2] D. Martins et al., Wireless Sensor Network Attacks and Securityf mechanisms: A Short Survey.

Google Scholar

[3] Y. Zhou et al., Securing Wireless Sensor Networks: A Survey.

Google Scholar

[4] Y. Wang et al., A Survey Of Security Issues In Wireless Sensor Networks.

Google Scholar

[5] N. Gura et al., Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, " CHES , 04: Proc. Wksp. Cryptographic Hardware and Embedded Systems, Aug. (2004).

DOI: 10.1007/978-3-540-28632-5_9

Google Scholar

[6] Ghamgin H, Akhgar M S, Jafari M T. Attacks in Wireless Sensor Network[J]. Journal of Applied Sciences Research, 2011, 7(7).

Google Scholar

[7] Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003; 1(2-3): 293–315.

DOI: 10.1016/s1570-8705(03)00008-8

Google Scholar

[8] Deepak Goyal and Malay Ranjan Tripathy, Routing Protocols in Wireless Sensor Networks: A Survey.

Google Scholar

[9] Sora D. Security Issues in Wireless Sensor Networks[J]. International Journal of Online Engineering (iJOE), 2010, 6(4): pp.26-30.

Google Scholar

[10] Newsome J, Shi E, Song D, et al. The Sybil Attack in Sensor Networks: Analysis & Defenses[J]. (2004).

Google Scholar

[11] E. Shi and A. Perrig, Designing Secure Sensor Networks, Wireless Commun. Mag., vol. 11, no. 6, Dec. 2004 p.38–43.

DOI: 10.1109/mwc.2004.1368895

Google Scholar

[12] D. W. Carman, P. S. Kruus, and B. J. Matt, Constraints and approaches for distributed sensor network security, NAI Labs Technical Report 00-010, (2000).

Google Scholar